pulumi-snowflake 0.50.3a1710160126__py3-none-any.whl → 1.2.0a1736835738__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-snowflake might be problematic. Click here for more details.
- pulumi_snowflake/__init__.py +224 -172
- pulumi_snowflake/_inputs.py +52857 -1665
- pulumi_snowflake/_utilities.py +41 -5
- pulumi_snowflake/account.py +188 -218
- pulumi_snowflake/account_authentication_policy_attachment.py +149 -0
- pulumi_snowflake/account_parameter.py +21 -48
- pulumi_snowflake/account_password_policy_attachment.py +7 -32
- pulumi_snowflake/account_role.py +250 -0
- pulumi_snowflake/alert.py +38 -47
- pulumi_snowflake/api_authentication_integration_with_authorization_code_grant.py +704 -0
- pulumi_snowflake/api_authentication_integration_with_client_credentials.py +657 -0
- pulumi_snowflake/api_authentication_integration_with_jwt_bearer.py +692 -0
- pulumi_snowflake/api_integration.py +33 -52
- pulumi_snowflake/authentication_policy.py +622 -0
- pulumi_snowflake/config/__init__.pyi +76 -99
- pulumi_snowflake/config/outputs.py +5 -0
- pulumi_snowflake/config/vars.py +93 -124
- pulumi_snowflake/cortex_search_service.py +596 -0
- pulumi_snowflake/database.py +819 -213
- pulumi_snowflake/database_role.py +81 -44
- pulumi_snowflake/dynamic_table.py +42 -49
- pulumi_snowflake/email_notification_integration.py +33 -28
- pulumi_snowflake/{unsafe_execute.py → execute.py} +36 -39
- pulumi_snowflake/external_function.py +54 -75
- pulumi_snowflake/external_oauth_integration.py +593 -542
- pulumi_snowflake/external_table.py +67 -90
- pulumi_snowflake/external_volume.py +382 -0
- pulumi_snowflake/failover_group.py +57 -98
- pulumi_snowflake/file_format.py +33 -28
- pulumi_snowflake/function_java.py +1211 -0
- pulumi_snowflake/function_javascript.py +882 -0
- pulumi_snowflake/function_python.py +1212 -0
- pulumi_snowflake/function_scala.py +1212 -0
- pulumi_snowflake/function_sql.py +835 -0
- pulumi_snowflake/get_account_roles.py +129 -0
- pulumi_snowflake/get_accounts.py +53 -22
- pulumi_snowflake/get_alerts.py +22 -9
- pulumi_snowflake/get_connections.py +109 -0
- pulumi_snowflake/get_cortex_search_services.py +216 -0
- pulumi_snowflake/get_current_account.py +24 -13
- pulumi_snowflake/get_current_role.py +14 -7
- pulumi_snowflake/get_database.py +25 -9
- pulumi_snowflake/get_database_role.py +162 -0
- pulumi_snowflake/get_database_roles.py +79 -47
- pulumi_snowflake/get_databases.py +91 -73
- pulumi_snowflake/get_dynamic_tables.py +36 -19
- pulumi_snowflake/get_external_functions.py +28 -9
- pulumi_snowflake/get_external_tables.py +28 -9
- pulumi_snowflake/get_failover_groups.py +18 -7
- pulumi_snowflake/get_file_formats.py +28 -9
- pulumi_snowflake/get_functions.py +28 -9
- pulumi_snowflake/get_grants.py +207 -84
- pulumi_snowflake/get_masking_policies.py +91 -51
- pulumi_snowflake/get_materialized_views.py +28 -9
- pulumi_snowflake/get_network_policies.py +129 -0
- pulumi_snowflake/get_parameters.py +38 -15
- pulumi_snowflake/get_pipes.py +28 -9
- pulumi_snowflake/get_procedures.py +28 -9
- pulumi_snowflake/get_resource_monitors.py +37 -24
- pulumi_snowflake/get_row_access_policies.py +91 -51
- pulumi_snowflake/get_schemas.py +145 -41
- pulumi_snowflake/get_secrets.py +200 -0
- pulumi_snowflake/get_security_integrations.py +129 -0
- pulumi_snowflake/get_sequences.py +28 -9
- pulumi_snowflake/get_shares.py +18 -9
- pulumi_snowflake/get_stages.py +28 -9
- pulumi_snowflake/get_storage_integrations.py +16 -9
- pulumi_snowflake/get_streamlits.py +170 -0
- pulumi_snowflake/get_streams.py +114 -54
- pulumi_snowflake/get_system_generate_scim_access_token.py +18 -9
- pulumi_snowflake/get_system_get_aws_sns_iam_policy.py +32 -7
- pulumi_snowflake/get_system_get_private_link_config.py +120 -5
- pulumi_snowflake/get_system_get_snowflake_platform_info.py +15 -7
- pulumi_snowflake/get_tables.py +28 -9
- pulumi_snowflake/get_tags.py +130 -0
- pulumi_snowflake/get_tasks.py +134 -54
- pulumi_snowflake/get_users.py +116 -44
- pulumi_snowflake/get_views.py +114 -54
- pulumi_snowflake/get_warehouses.py +79 -26
- pulumi_snowflake/grant_account_role.py +28 -75
- pulumi_snowflake/grant_application_role.py +257 -0
- pulumi_snowflake/grant_database_role.py +35 -94
- pulumi_snowflake/grant_ownership.py +382 -0
- pulumi_snowflake/grant_privileges_to_account_role.py +42 -78
- pulumi_snowflake/grant_privileges_to_database_role.py +37 -383
- pulumi_snowflake/grant_privileges_to_share.py +96 -44
- pulumi_snowflake/legacy_service_user.py +3670 -0
- pulumi_snowflake/managed_account.py +40 -11
- pulumi_snowflake/masking_policy.py +213 -310
- pulumi_snowflake/materialized_view.py +62 -71
- pulumi_snowflake/network_policy.py +217 -61
- pulumi_snowflake/network_policy_attachment.py +5 -34
- pulumi_snowflake/network_rule.py +473 -0
- pulumi_snowflake/notification_integration.py +49 -84
- pulumi_snowflake/oauth_integration_for_custom_clients.py +906 -0
- pulumi_snowflake/{oauth_integration.py → oauth_integration_for_partner_applications.py} +191 -192
- pulumi_snowflake/object_parameter.py +10 -101
- pulumi_snowflake/outputs.py +49200 -2928
- pulumi_snowflake/password_policy.py +41 -28
- pulumi_snowflake/pipe.py +33 -4
- pulumi_snowflake/primary_connection.py +330 -0
- pulumi_snowflake/procedure_java.py +1273 -0
- pulumi_snowflake/procedure_javascript.py +895 -0
- pulumi_snowflake/procedure_python.py +1226 -0
- pulumi_snowflake/procedure_scala.py +1273 -0
- pulumi_snowflake/procedure_sql.py +895 -0
- pulumi_snowflake/provider.py +378 -613
- pulumi_snowflake/pulumi-plugin.json +2 -1
- pulumi_snowflake/resource_monitor.py +118 -327
- pulumi_snowflake/row_access_policy.py +200 -149
- pulumi_snowflake/{saml_integration.py → saml2_integration.py} +356 -299
- pulumi_snowflake/schema.py +949 -178
- pulumi_snowflake/scim_integration.py +286 -109
- pulumi_snowflake/secondary_connection.py +339 -0
- pulumi_snowflake/secondary_database.py +1080 -0
- pulumi_snowflake/secret_with_authorization_code_grant.py +548 -0
- pulumi_snowflake/secret_with_basic_authentication.py +500 -0
- pulumi_snowflake/secret_with_client_credentials.py +511 -0
- pulumi_snowflake/secret_with_generic_string.py +452 -0
- pulumi_snowflake/sequence.py +9 -34
- pulumi_snowflake/service_user.py +3585 -0
- pulumi_snowflake/share.py +33 -28
- pulumi_snowflake/shared_database.py +939 -0
- pulumi_snowflake/stage.py +95 -84
- pulumi_snowflake/storage_integration.py +46 -4
- pulumi_snowflake/stream_on_directory_table.py +517 -0
- pulumi_snowflake/stream_on_external_table.py +632 -0
- pulumi_snowflake/stream_on_table.py +666 -0
- pulumi_snowflake/stream_on_view.py +666 -0
- pulumi_snowflake/streamlit.py +671 -0
- pulumi_snowflake/table.py +86 -97
- pulumi_snowflake/table_column_masking_policy_application.py +7 -14
- pulumi_snowflake/table_constraint.py +29 -172
- pulumi_snowflake/tag.py +142 -74
- pulumi_snowflake/tag_association.py +40 -215
- pulumi_snowflake/task.py +3048 -418
- pulumi_snowflake/user.py +3351 -384
- pulumi_snowflake/user_authentication_policy_attachment.py +197 -0
- pulumi_snowflake/user_password_policy_attachment.py +5 -4
- pulumi_snowflake/user_public_keys.py +5 -0
- pulumi_snowflake/view.py +466 -215
- pulumi_snowflake/warehouse.py +184 -168
- {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736835738.dist-info}/METADATA +7 -6
- pulumi_snowflake-1.2.0a1736835738.dist-info/RECORD +148 -0
- {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736835738.dist-info}/WHEEL +1 -1
- pulumi_snowflake/account_grant.py +0 -343
- pulumi_snowflake/database_grant.py +0 -495
- pulumi_snowflake/external_table_grant.py +0 -690
- pulumi_snowflake/failover_group_grant.py +0 -388
- pulumi_snowflake/file_format_grant.py +0 -635
- pulumi_snowflake/function.py +0 -872
- pulumi_snowflake/function_grant.py +0 -745
- pulumi_snowflake/get_role.py +0 -121
- pulumi_snowflake/get_roles.py +0 -120
- pulumi_snowflake/grant_privileges_to_role.py +0 -825
- pulumi_snowflake/integration_grant.py +0 -440
- pulumi_snowflake/masking_policy_grant.py +0 -542
- pulumi_snowflake/materialized_view_grant.py +0 -689
- pulumi_snowflake/pipe_grant.py +0 -587
- pulumi_snowflake/procedure.py +0 -887
- pulumi_snowflake/procedure_grant.py +0 -745
- pulumi_snowflake/resource_monitor_grant.py +0 -387
- pulumi_snowflake/role.py +0 -273
- pulumi_snowflake/role_grants.py +0 -352
- pulumi_snowflake/role_ownership_grant.py +0 -338
- pulumi_snowflake/row_access_policy_grant.py +0 -540
- pulumi_snowflake/schema_grant.py +0 -647
- pulumi_snowflake/sequence_grant.py +0 -635
- pulumi_snowflake/session_parameter.py +0 -332
- pulumi_snowflake/stage_grant.py +0 -635
- pulumi_snowflake/stream.py +0 -614
- pulumi_snowflake/stream_grant.py +0 -635
- pulumi_snowflake/table_grant.py +0 -677
- pulumi_snowflake/tag_grant.py +0 -532
- pulumi_snowflake/tag_masking_policy_association.py +0 -210
- pulumi_snowflake/task_grant.py +0 -635
- pulumi_snowflake/user_grant.py +0 -394
- pulumi_snowflake/user_ownership_grant.py +0 -286
- pulumi_snowflake/view_grant.py +0 -705
- pulumi_snowflake/warehouse_grant.py +0 -440
- pulumi_snowflake-0.50.3a1710160126.dist-info/RECORD +0 -136
- {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736835738.dist-info}/top_level.txt +0 -0
pulumi_snowflake/role_grants.py
DELETED
|
@@ -1,352 +0,0 @@
|
|
|
1
|
-
# coding=utf-8
|
|
2
|
-
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
-
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
|
|
5
|
-
import copy
|
|
6
|
-
import warnings
|
|
7
|
-
import pulumi
|
|
8
|
-
import pulumi.runtime
|
|
9
|
-
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
10
|
-
from . import _utilities
|
|
11
|
-
|
|
12
|
-
__all__ = ['RoleGrantsArgs', 'RoleGrants']
|
|
13
|
-
|
|
14
|
-
@pulumi.input_type
|
|
15
|
-
class RoleGrantsArgs:
|
|
16
|
-
def __init__(__self__, *,
|
|
17
|
-
role_name: pulumi.Input[str],
|
|
18
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
19
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
20
|
-
users: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
|
21
|
-
"""
|
|
22
|
-
The set of arguments for constructing a RoleGrants resource.
|
|
23
|
-
:param pulumi.Input[str] role_name: The name of the role we are granting.
|
|
24
|
-
:param pulumi.Input[bool] enable_multiple_grants: When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
25
|
-
grants applied to roles and objects outside Terraform.
|
|
26
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: Grants role to this specified role.
|
|
27
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] users: Grants role to this specified user.
|
|
28
|
-
"""
|
|
29
|
-
pulumi.set(__self__, "role_name", role_name)
|
|
30
|
-
if enable_multiple_grants is not None:
|
|
31
|
-
pulumi.set(__self__, "enable_multiple_grants", enable_multiple_grants)
|
|
32
|
-
if roles is not None:
|
|
33
|
-
pulumi.set(__self__, "roles", roles)
|
|
34
|
-
if users is not None:
|
|
35
|
-
pulumi.set(__self__, "users", users)
|
|
36
|
-
|
|
37
|
-
@property
|
|
38
|
-
@pulumi.getter(name="roleName")
|
|
39
|
-
def role_name(self) -> pulumi.Input[str]:
|
|
40
|
-
"""
|
|
41
|
-
The name of the role we are granting.
|
|
42
|
-
"""
|
|
43
|
-
return pulumi.get(self, "role_name")
|
|
44
|
-
|
|
45
|
-
@role_name.setter
|
|
46
|
-
def role_name(self, value: pulumi.Input[str]):
|
|
47
|
-
pulumi.set(self, "role_name", value)
|
|
48
|
-
|
|
49
|
-
@property
|
|
50
|
-
@pulumi.getter(name="enableMultipleGrants")
|
|
51
|
-
def enable_multiple_grants(self) -> Optional[pulumi.Input[bool]]:
|
|
52
|
-
"""
|
|
53
|
-
When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
54
|
-
grants applied to roles and objects outside Terraform.
|
|
55
|
-
"""
|
|
56
|
-
return pulumi.get(self, "enable_multiple_grants")
|
|
57
|
-
|
|
58
|
-
@enable_multiple_grants.setter
|
|
59
|
-
def enable_multiple_grants(self, value: Optional[pulumi.Input[bool]]):
|
|
60
|
-
pulumi.set(self, "enable_multiple_grants", value)
|
|
61
|
-
|
|
62
|
-
@property
|
|
63
|
-
@pulumi.getter
|
|
64
|
-
def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
65
|
-
"""
|
|
66
|
-
Grants role to this specified role.
|
|
67
|
-
"""
|
|
68
|
-
return pulumi.get(self, "roles")
|
|
69
|
-
|
|
70
|
-
@roles.setter
|
|
71
|
-
def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
72
|
-
pulumi.set(self, "roles", value)
|
|
73
|
-
|
|
74
|
-
@property
|
|
75
|
-
@pulumi.getter
|
|
76
|
-
def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
77
|
-
"""
|
|
78
|
-
Grants role to this specified user.
|
|
79
|
-
"""
|
|
80
|
-
return pulumi.get(self, "users")
|
|
81
|
-
|
|
82
|
-
@users.setter
|
|
83
|
-
def users(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
84
|
-
pulumi.set(self, "users", value)
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
@pulumi.input_type
|
|
88
|
-
class _RoleGrantsState:
|
|
89
|
-
def __init__(__self__, *,
|
|
90
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
91
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
|
92
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
93
|
-
users: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
|
94
|
-
"""
|
|
95
|
-
Input properties used for looking up and filtering RoleGrants resources.
|
|
96
|
-
:param pulumi.Input[bool] enable_multiple_grants: When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
97
|
-
grants applied to roles and objects outside Terraform.
|
|
98
|
-
:param pulumi.Input[str] role_name: The name of the role we are granting.
|
|
99
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: Grants role to this specified role.
|
|
100
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] users: Grants role to this specified user.
|
|
101
|
-
"""
|
|
102
|
-
if enable_multiple_grants is not None:
|
|
103
|
-
pulumi.set(__self__, "enable_multiple_grants", enable_multiple_grants)
|
|
104
|
-
if role_name is not None:
|
|
105
|
-
pulumi.set(__self__, "role_name", role_name)
|
|
106
|
-
if roles is not None:
|
|
107
|
-
pulumi.set(__self__, "roles", roles)
|
|
108
|
-
if users is not None:
|
|
109
|
-
pulumi.set(__self__, "users", users)
|
|
110
|
-
|
|
111
|
-
@property
|
|
112
|
-
@pulumi.getter(name="enableMultipleGrants")
|
|
113
|
-
def enable_multiple_grants(self) -> Optional[pulumi.Input[bool]]:
|
|
114
|
-
"""
|
|
115
|
-
When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
116
|
-
grants applied to roles and objects outside Terraform.
|
|
117
|
-
"""
|
|
118
|
-
return pulumi.get(self, "enable_multiple_grants")
|
|
119
|
-
|
|
120
|
-
@enable_multiple_grants.setter
|
|
121
|
-
def enable_multiple_grants(self, value: Optional[pulumi.Input[bool]]):
|
|
122
|
-
pulumi.set(self, "enable_multiple_grants", value)
|
|
123
|
-
|
|
124
|
-
@property
|
|
125
|
-
@pulumi.getter(name="roleName")
|
|
126
|
-
def role_name(self) -> Optional[pulumi.Input[str]]:
|
|
127
|
-
"""
|
|
128
|
-
The name of the role we are granting.
|
|
129
|
-
"""
|
|
130
|
-
return pulumi.get(self, "role_name")
|
|
131
|
-
|
|
132
|
-
@role_name.setter
|
|
133
|
-
def role_name(self, value: Optional[pulumi.Input[str]]):
|
|
134
|
-
pulumi.set(self, "role_name", value)
|
|
135
|
-
|
|
136
|
-
@property
|
|
137
|
-
@pulumi.getter
|
|
138
|
-
def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
139
|
-
"""
|
|
140
|
-
Grants role to this specified role.
|
|
141
|
-
"""
|
|
142
|
-
return pulumi.get(self, "roles")
|
|
143
|
-
|
|
144
|
-
@roles.setter
|
|
145
|
-
def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
146
|
-
pulumi.set(self, "roles", value)
|
|
147
|
-
|
|
148
|
-
@property
|
|
149
|
-
@pulumi.getter
|
|
150
|
-
def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
151
|
-
"""
|
|
152
|
-
Grants role to this specified user.
|
|
153
|
-
"""
|
|
154
|
-
return pulumi.get(self, "users")
|
|
155
|
-
|
|
156
|
-
@users.setter
|
|
157
|
-
def users(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
158
|
-
pulumi.set(self, "users", value)
|
|
159
|
-
|
|
160
|
-
|
|
161
|
-
class RoleGrants(pulumi.CustomResource):
|
|
162
|
-
@overload
|
|
163
|
-
def __init__(__self__,
|
|
164
|
-
resource_name: str,
|
|
165
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
166
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
167
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
|
168
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
169
|
-
users: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
170
|
-
__props__=None):
|
|
171
|
-
"""
|
|
172
|
-
> **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use GrantAccountRole instead. <deprecation>
|
|
173
|
-
|
|
174
|
-
## Example Usage
|
|
175
|
-
|
|
176
|
-
<!--Start PulumiCodeChooser -->
|
|
177
|
-
```python
|
|
178
|
-
import pulumi
|
|
179
|
-
import pulumi_snowflake as snowflake
|
|
180
|
-
|
|
181
|
-
role = snowflake.Role("role", comment="for testing")
|
|
182
|
-
user = snowflake.User("user", comment="for testing")
|
|
183
|
-
user2 = snowflake.User("user2", comment="for testing")
|
|
184
|
-
other_role = snowflake.Role("otherRole")
|
|
185
|
-
grants = snowflake.RoleGrants("grants",
|
|
186
|
-
role_name=role.name,
|
|
187
|
-
roles=[other_role.name],
|
|
188
|
-
users=[
|
|
189
|
-
user.name,
|
|
190
|
-
user2.name,
|
|
191
|
-
])
|
|
192
|
-
```
|
|
193
|
-
<!--End PulumiCodeChooser -->
|
|
194
|
-
|
|
195
|
-
## Import
|
|
196
|
-
|
|
197
|
-
format is role_name|roles|users
|
|
198
|
-
|
|
199
|
-
```sh
|
|
200
|
-
$ pulumi import snowflake:index/roleGrants:RoleGrants example "role_name|role1,role2|user1,user2"
|
|
201
|
-
```
|
|
202
|
-
|
|
203
|
-
:param str resource_name: The name of the resource.
|
|
204
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
205
|
-
:param pulumi.Input[bool] enable_multiple_grants: When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
206
|
-
grants applied to roles and objects outside Terraform.
|
|
207
|
-
:param pulumi.Input[str] role_name: The name of the role we are granting.
|
|
208
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: Grants role to this specified role.
|
|
209
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] users: Grants role to this specified user.
|
|
210
|
-
"""
|
|
211
|
-
...
|
|
212
|
-
@overload
|
|
213
|
-
def __init__(__self__,
|
|
214
|
-
resource_name: str,
|
|
215
|
-
args: RoleGrantsArgs,
|
|
216
|
-
opts: Optional[pulumi.ResourceOptions] = None):
|
|
217
|
-
"""
|
|
218
|
-
> **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use GrantAccountRole instead. <deprecation>
|
|
219
|
-
|
|
220
|
-
## Example Usage
|
|
221
|
-
|
|
222
|
-
<!--Start PulumiCodeChooser -->
|
|
223
|
-
```python
|
|
224
|
-
import pulumi
|
|
225
|
-
import pulumi_snowflake as snowflake
|
|
226
|
-
|
|
227
|
-
role = snowflake.Role("role", comment="for testing")
|
|
228
|
-
user = snowflake.User("user", comment="for testing")
|
|
229
|
-
user2 = snowflake.User("user2", comment="for testing")
|
|
230
|
-
other_role = snowflake.Role("otherRole")
|
|
231
|
-
grants = snowflake.RoleGrants("grants",
|
|
232
|
-
role_name=role.name,
|
|
233
|
-
roles=[other_role.name],
|
|
234
|
-
users=[
|
|
235
|
-
user.name,
|
|
236
|
-
user2.name,
|
|
237
|
-
])
|
|
238
|
-
```
|
|
239
|
-
<!--End PulumiCodeChooser -->
|
|
240
|
-
|
|
241
|
-
## Import
|
|
242
|
-
|
|
243
|
-
format is role_name|roles|users
|
|
244
|
-
|
|
245
|
-
```sh
|
|
246
|
-
$ pulumi import snowflake:index/roleGrants:RoleGrants example "role_name|role1,role2|user1,user2"
|
|
247
|
-
```
|
|
248
|
-
|
|
249
|
-
:param str resource_name: The name of the resource.
|
|
250
|
-
:param RoleGrantsArgs args: The arguments to use to populate this resource's properties.
|
|
251
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
252
|
-
"""
|
|
253
|
-
...
|
|
254
|
-
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
255
|
-
resource_args, opts = _utilities.get_resource_args_opts(RoleGrantsArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
256
|
-
if resource_args is not None:
|
|
257
|
-
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
258
|
-
else:
|
|
259
|
-
__self__._internal_init(resource_name, *args, **kwargs)
|
|
260
|
-
|
|
261
|
-
def _internal_init(__self__,
|
|
262
|
-
resource_name: str,
|
|
263
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
264
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
265
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
|
266
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
267
|
-
users: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
268
|
-
__props__=None):
|
|
269
|
-
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
270
|
-
if not isinstance(opts, pulumi.ResourceOptions):
|
|
271
|
-
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
272
|
-
if opts.id is None:
|
|
273
|
-
if __props__ is not None:
|
|
274
|
-
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
275
|
-
__props__ = RoleGrantsArgs.__new__(RoleGrantsArgs)
|
|
276
|
-
|
|
277
|
-
__props__.__dict__["enable_multiple_grants"] = enable_multiple_grants
|
|
278
|
-
if role_name is None and not opts.urn:
|
|
279
|
-
raise TypeError("Missing required property 'role_name'")
|
|
280
|
-
__props__.__dict__["role_name"] = role_name
|
|
281
|
-
__props__.__dict__["roles"] = roles
|
|
282
|
-
__props__.__dict__["users"] = users
|
|
283
|
-
super(RoleGrants, __self__).__init__(
|
|
284
|
-
'snowflake:index/roleGrants:RoleGrants',
|
|
285
|
-
resource_name,
|
|
286
|
-
__props__,
|
|
287
|
-
opts)
|
|
288
|
-
|
|
289
|
-
@staticmethod
|
|
290
|
-
def get(resource_name: str,
|
|
291
|
-
id: pulumi.Input[str],
|
|
292
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
293
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
294
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
|
295
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
296
|
-
users: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'RoleGrants':
|
|
297
|
-
"""
|
|
298
|
-
Get an existing RoleGrants resource's state with the given name, id, and optional extra
|
|
299
|
-
properties used to qualify the lookup.
|
|
300
|
-
|
|
301
|
-
:param str resource_name: The unique name of the resulting resource.
|
|
302
|
-
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
303
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
304
|
-
:param pulumi.Input[bool] enable_multiple_grants: When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
305
|
-
grants applied to roles and objects outside Terraform.
|
|
306
|
-
:param pulumi.Input[str] role_name: The name of the role we are granting.
|
|
307
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: Grants role to this specified role.
|
|
308
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] users: Grants role to this specified user.
|
|
309
|
-
"""
|
|
310
|
-
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
311
|
-
|
|
312
|
-
__props__ = _RoleGrantsState.__new__(_RoleGrantsState)
|
|
313
|
-
|
|
314
|
-
__props__.__dict__["enable_multiple_grants"] = enable_multiple_grants
|
|
315
|
-
__props__.__dict__["role_name"] = role_name
|
|
316
|
-
__props__.__dict__["roles"] = roles
|
|
317
|
-
__props__.__dict__["users"] = users
|
|
318
|
-
return RoleGrants(resource_name, opts=opts, __props__=__props__)
|
|
319
|
-
|
|
320
|
-
@property
|
|
321
|
-
@pulumi.getter(name="enableMultipleGrants")
|
|
322
|
-
def enable_multiple_grants(self) -> pulumi.Output[Optional[bool]]:
|
|
323
|
-
"""
|
|
324
|
-
When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
325
|
-
grants applied to roles and objects outside Terraform.
|
|
326
|
-
"""
|
|
327
|
-
return pulumi.get(self, "enable_multiple_grants")
|
|
328
|
-
|
|
329
|
-
@property
|
|
330
|
-
@pulumi.getter(name="roleName")
|
|
331
|
-
def role_name(self) -> pulumi.Output[str]:
|
|
332
|
-
"""
|
|
333
|
-
The name of the role we are granting.
|
|
334
|
-
"""
|
|
335
|
-
return pulumi.get(self, "role_name")
|
|
336
|
-
|
|
337
|
-
@property
|
|
338
|
-
@pulumi.getter
|
|
339
|
-
def roles(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
|
340
|
-
"""
|
|
341
|
-
Grants role to this specified role.
|
|
342
|
-
"""
|
|
343
|
-
return pulumi.get(self, "roles")
|
|
344
|
-
|
|
345
|
-
@property
|
|
346
|
-
@pulumi.getter
|
|
347
|
-
def users(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
|
348
|
-
"""
|
|
349
|
-
Grants role to this specified user.
|
|
350
|
-
"""
|
|
351
|
-
return pulumi.get(self, "users")
|
|
352
|
-
|
|
@@ -1,338 +0,0 @@
|
|
|
1
|
-
# coding=utf-8
|
|
2
|
-
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
-
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
|
|
5
|
-
import copy
|
|
6
|
-
import warnings
|
|
7
|
-
import pulumi
|
|
8
|
-
import pulumi.runtime
|
|
9
|
-
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
10
|
-
from . import _utilities
|
|
11
|
-
|
|
12
|
-
__all__ = ['RoleOwnershipGrantArgs', 'RoleOwnershipGrant']
|
|
13
|
-
|
|
14
|
-
@pulumi.input_type
|
|
15
|
-
class RoleOwnershipGrantArgs:
|
|
16
|
-
def __init__(__self__, *,
|
|
17
|
-
on_role_name: pulumi.Input[str],
|
|
18
|
-
to_role_name: pulumi.Input[str],
|
|
19
|
-
current_grants: Optional[pulumi.Input[str]] = None,
|
|
20
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None):
|
|
21
|
-
"""
|
|
22
|
-
The set of arguments for constructing a RoleOwnershipGrant resource.
|
|
23
|
-
:param pulumi.Input[str] on_role_name: The name of the role ownership is granted on.
|
|
24
|
-
:param pulumi.Input[str] to_role_name: The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
25
|
-
:param pulumi.Input[str] current_grants: Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
26
|
-
:param pulumi.Input[str] revert_ownership_to_role_name: The name of the role to revert ownership to on destroy.
|
|
27
|
-
"""
|
|
28
|
-
pulumi.set(__self__, "on_role_name", on_role_name)
|
|
29
|
-
pulumi.set(__self__, "to_role_name", to_role_name)
|
|
30
|
-
if current_grants is not None:
|
|
31
|
-
pulumi.set(__self__, "current_grants", current_grants)
|
|
32
|
-
if revert_ownership_to_role_name is not None:
|
|
33
|
-
pulumi.set(__self__, "revert_ownership_to_role_name", revert_ownership_to_role_name)
|
|
34
|
-
|
|
35
|
-
@property
|
|
36
|
-
@pulumi.getter(name="onRoleName")
|
|
37
|
-
def on_role_name(self) -> pulumi.Input[str]:
|
|
38
|
-
"""
|
|
39
|
-
The name of the role ownership is granted on.
|
|
40
|
-
"""
|
|
41
|
-
return pulumi.get(self, "on_role_name")
|
|
42
|
-
|
|
43
|
-
@on_role_name.setter
|
|
44
|
-
def on_role_name(self, value: pulumi.Input[str]):
|
|
45
|
-
pulumi.set(self, "on_role_name", value)
|
|
46
|
-
|
|
47
|
-
@property
|
|
48
|
-
@pulumi.getter(name="toRoleName")
|
|
49
|
-
def to_role_name(self) -> pulumi.Input[str]:
|
|
50
|
-
"""
|
|
51
|
-
The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
52
|
-
"""
|
|
53
|
-
return pulumi.get(self, "to_role_name")
|
|
54
|
-
|
|
55
|
-
@to_role_name.setter
|
|
56
|
-
def to_role_name(self, value: pulumi.Input[str]):
|
|
57
|
-
pulumi.set(self, "to_role_name", value)
|
|
58
|
-
|
|
59
|
-
@property
|
|
60
|
-
@pulumi.getter(name="currentGrants")
|
|
61
|
-
def current_grants(self) -> Optional[pulumi.Input[str]]:
|
|
62
|
-
"""
|
|
63
|
-
Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
64
|
-
"""
|
|
65
|
-
return pulumi.get(self, "current_grants")
|
|
66
|
-
|
|
67
|
-
@current_grants.setter
|
|
68
|
-
def current_grants(self, value: Optional[pulumi.Input[str]]):
|
|
69
|
-
pulumi.set(self, "current_grants", value)
|
|
70
|
-
|
|
71
|
-
@property
|
|
72
|
-
@pulumi.getter(name="revertOwnershipToRoleName")
|
|
73
|
-
def revert_ownership_to_role_name(self) -> Optional[pulumi.Input[str]]:
|
|
74
|
-
"""
|
|
75
|
-
The name of the role to revert ownership to on destroy.
|
|
76
|
-
"""
|
|
77
|
-
return pulumi.get(self, "revert_ownership_to_role_name")
|
|
78
|
-
|
|
79
|
-
@revert_ownership_to_role_name.setter
|
|
80
|
-
def revert_ownership_to_role_name(self, value: Optional[pulumi.Input[str]]):
|
|
81
|
-
pulumi.set(self, "revert_ownership_to_role_name", value)
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
@pulumi.input_type
|
|
85
|
-
class _RoleOwnershipGrantState:
|
|
86
|
-
def __init__(__self__, *,
|
|
87
|
-
current_grants: Optional[pulumi.Input[str]] = None,
|
|
88
|
-
on_role_name: Optional[pulumi.Input[str]] = None,
|
|
89
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None,
|
|
90
|
-
to_role_name: Optional[pulumi.Input[str]] = None):
|
|
91
|
-
"""
|
|
92
|
-
Input properties used for looking up and filtering RoleOwnershipGrant resources.
|
|
93
|
-
:param pulumi.Input[str] current_grants: Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
94
|
-
:param pulumi.Input[str] on_role_name: The name of the role ownership is granted on.
|
|
95
|
-
:param pulumi.Input[str] revert_ownership_to_role_name: The name of the role to revert ownership to on destroy.
|
|
96
|
-
:param pulumi.Input[str] to_role_name: The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
97
|
-
"""
|
|
98
|
-
if current_grants is not None:
|
|
99
|
-
pulumi.set(__self__, "current_grants", current_grants)
|
|
100
|
-
if on_role_name is not None:
|
|
101
|
-
pulumi.set(__self__, "on_role_name", on_role_name)
|
|
102
|
-
if revert_ownership_to_role_name is not None:
|
|
103
|
-
pulumi.set(__self__, "revert_ownership_to_role_name", revert_ownership_to_role_name)
|
|
104
|
-
if to_role_name is not None:
|
|
105
|
-
pulumi.set(__self__, "to_role_name", to_role_name)
|
|
106
|
-
|
|
107
|
-
@property
|
|
108
|
-
@pulumi.getter(name="currentGrants")
|
|
109
|
-
def current_grants(self) -> Optional[pulumi.Input[str]]:
|
|
110
|
-
"""
|
|
111
|
-
Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
112
|
-
"""
|
|
113
|
-
return pulumi.get(self, "current_grants")
|
|
114
|
-
|
|
115
|
-
@current_grants.setter
|
|
116
|
-
def current_grants(self, value: Optional[pulumi.Input[str]]):
|
|
117
|
-
pulumi.set(self, "current_grants", value)
|
|
118
|
-
|
|
119
|
-
@property
|
|
120
|
-
@pulumi.getter(name="onRoleName")
|
|
121
|
-
def on_role_name(self) -> Optional[pulumi.Input[str]]:
|
|
122
|
-
"""
|
|
123
|
-
The name of the role ownership is granted on.
|
|
124
|
-
"""
|
|
125
|
-
return pulumi.get(self, "on_role_name")
|
|
126
|
-
|
|
127
|
-
@on_role_name.setter
|
|
128
|
-
def on_role_name(self, value: Optional[pulumi.Input[str]]):
|
|
129
|
-
pulumi.set(self, "on_role_name", value)
|
|
130
|
-
|
|
131
|
-
@property
|
|
132
|
-
@pulumi.getter(name="revertOwnershipToRoleName")
|
|
133
|
-
def revert_ownership_to_role_name(self) -> Optional[pulumi.Input[str]]:
|
|
134
|
-
"""
|
|
135
|
-
The name of the role to revert ownership to on destroy.
|
|
136
|
-
"""
|
|
137
|
-
return pulumi.get(self, "revert_ownership_to_role_name")
|
|
138
|
-
|
|
139
|
-
@revert_ownership_to_role_name.setter
|
|
140
|
-
def revert_ownership_to_role_name(self, value: Optional[pulumi.Input[str]]):
|
|
141
|
-
pulumi.set(self, "revert_ownership_to_role_name", value)
|
|
142
|
-
|
|
143
|
-
@property
|
|
144
|
-
@pulumi.getter(name="toRoleName")
|
|
145
|
-
def to_role_name(self) -> Optional[pulumi.Input[str]]:
|
|
146
|
-
"""
|
|
147
|
-
The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
148
|
-
"""
|
|
149
|
-
return pulumi.get(self, "to_role_name")
|
|
150
|
-
|
|
151
|
-
@to_role_name.setter
|
|
152
|
-
def to_role_name(self, value: Optional[pulumi.Input[str]]):
|
|
153
|
-
pulumi.set(self, "to_role_name", value)
|
|
154
|
-
|
|
155
|
-
|
|
156
|
-
class RoleOwnershipGrant(pulumi.CustomResource):
|
|
157
|
-
@overload
|
|
158
|
-
def __init__(__self__,
|
|
159
|
-
resource_name: str,
|
|
160
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
161
|
-
current_grants: Optional[pulumi.Input[str]] = None,
|
|
162
|
-
on_role_name: Optional[pulumi.Input[str]] = None,
|
|
163
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None,
|
|
164
|
-
to_role_name: Optional[pulumi.Input[str]] = None,
|
|
165
|
-
__props__=None):
|
|
166
|
-
"""
|
|
167
|
-
## Example Usage
|
|
168
|
-
|
|
169
|
-
<!--Start PulumiCodeChooser -->
|
|
170
|
-
```python
|
|
171
|
-
import pulumi
|
|
172
|
-
import pulumi_snowflake as snowflake
|
|
173
|
-
|
|
174
|
-
role = snowflake.Role("role", comment="for testing")
|
|
175
|
-
other_role = snowflake.Role("otherRole")
|
|
176
|
-
# ensure the Terraform user inherits ownership privileges for the rking_test_role role
|
|
177
|
-
# otherwise Terraform will fail to destroy the rking_test_role2 role due to insufficient privileges
|
|
178
|
-
grants = snowflake.RoleGrants("grants",
|
|
179
|
-
role_name=role.name,
|
|
180
|
-
roles=["ACCOUNTADMIN"])
|
|
181
|
-
grant = snowflake.RoleOwnershipGrant("grant",
|
|
182
|
-
on_role_name=role.name,
|
|
183
|
-
to_role_name=other_role.name,
|
|
184
|
-
current_grants="COPY")
|
|
185
|
-
```
|
|
186
|
-
<!--End PulumiCodeChooser -->
|
|
187
|
-
|
|
188
|
-
## Import
|
|
189
|
-
|
|
190
|
-
```sh
|
|
191
|
-
$ pulumi import snowflake:index/roleOwnershipGrant:RoleOwnershipGrant example "<on_role_name>|<to_role_name>|<current_grants>"
|
|
192
|
-
```
|
|
193
|
-
|
|
194
|
-
:param str resource_name: The name of the resource.
|
|
195
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
196
|
-
:param pulumi.Input[str] current_grants: Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
197
|
-
:param pulumi.Input[str] on_role_name: The name of the role ownership is granted on.
|
|
198
|
-
:param pulumi.Input[str] revert_ownership_to_role_name: The name of the role to revert ownership to on destroy.
|
|
199
|
-
:param pulumi.Input[str] to_role_name: The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
200
|
-
"""
|
|
201
|
-
...
|
|
202
|
-
@overload
|
|
203
|
-
def __init__(__self__,
|
|
204
|
-
resource_name: str,
|
|
205
|
-
args: RoleOwnershipGrantArgs,
|
|
206
|
-
opts: Optional[pulumi.ResourceOptions] = None):
|
|
207
|
-
"""
|
|
208
|
-
## Example Usage
|
|
209
|
-
|
|
210
|
-
<!--Start PulumiCodeChooser -->
|
|
211
|
-
```python
|
|
212
|
-
import pulumi
|
|
213
|
-
import pulumi_snowflake as snowflake
|
|
214
|
-
|
|
215
|
-
role = snowflake.Role("role", comment="for testing")
|
|
216
|
-
other_role = snowflake.Role("otherRole")
|
|
217
|
-
# ensure the Terraform user inherits ownership privileges for the rking_test_role role
|
|
218
|
-
# otherwise Terraform will fail to destroy the rking_test_role2 role due to insufficient privileges
|
|
219
|
-
grants = snowflake.RoleGrants("grants",
|
|
220
|
-
role_name=role.name,
|
|
221
|
-
roles=["ACCOUNTADMIN"])
|
|
222
|
-
grant = snowflake.RoleOwnershipGrant("grant",
|
|
223
|
-
on_role_name=role.name,
|
|
224
|
-
to_role_name=other_role.name,
|
|
225
|
-
current_grants="COPY")
|
|
226
|
-
```
|
|
227
|
-
<!--End PulumiCodeChooser -->
|
|
228
|
-
|
|
229
|
-
## Import
|
|
230
|
-
|
|
231
|
-
```sh
|
|
232
|
-
$ pulumi import snowflake:index/roleOwnershipGrant:RoleOwnershipGrant example "<on_role_name>|<to_role_name>|<current_grants>"
|
|
233
|
-
```
|
|
234
|
-
|
|
235
|
-
:param str resource_name: The name of the resource.
|
|
236
|
-
:param RoleOwnershipGrantArgs args: The arguments to use to populate this resource's properties.
|
|
237
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
238
|
-
"""
|
|
239
|
-
...
|
|
240
|
-
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
241
|
-
resource_args, opts = _utilities.get_resource_args_opts(RoleOwnershipGrantArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
242
|
-
if resource_args is not None:
|
|
243
|
-
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
244
|
-
else:
|
|
245
|
-
__self__._internal_init(resource_name, *args, **kwargs)
|
|
246
|
-
|
|
247
|
-
def _internal_init(__self__,
|
|
248
|
-
resource_name: str,
|
|
249
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
250
|
-
current_grants: Optional[pulumi.Input[str]] = None,
|
|
251
|
-
on_role_name: Optional[pulumi.Input[str]] = None,
|
|
252
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None,
|
|
253
|
-
to_role_name: Optional[pulumi.Input[str]] = None,
|
|
254
|
-
__props__=None):
|
|
255
|
-
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
256
|
-
if not isinstance(opts, pulumi.ResourceOptions):
|
|
257
|
-
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
258
|
-
if opts.id is None:
|
|
259
|
-
if __props__ is not None:
|
|
260
|
-
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
261
|
-
__props__ = RoleOwnershipGrantArgs.__new__(RoleOwnershipGrantArgs)
|
|
262
|
-
|
|
263
|
-
__props__.__dict__["current_grants"] = current_grants
|
|
264
|
-
if on_role_name is None and not opts.urn:
|
|
265
|
-
raise TypeError("Missing required property 'on_role_name'")
|
|
266
|
-
__props__.__dict__["on_role_name"] = on_role_name
|
|
267
|
-
__props__.__dict__["revert_ownership_to_role_name"] = revert_ownership_to_role_name
|
|
268
|
-
if to_role_name is None and not opts.urn:
|
|
269
|
-
raise TypeError("Missing required property 'to_role_name'")
|
|
270
|
-
__props__.__dict__["to_role_name"] = to_role_name
|
|
271
|
-
super(RoleOwnershipGrant, __self__).__init__(
|
|
272
|
-
'snowflake:index/roleOwnershipGrant:RoleOwnershipGrant',
|
|
273
|
-
resource_name,
|
|
274
|
-
__props__,
|
|
275
|
-
opts)
|
|
276
|
-
|
|
277
|
-
@staticmethod
|
|
278
|
-
def get(resource_name: str,
|
|
279
|
-
id: pulumi.Input[str],
|
|
280
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
281
|
-
current_grants: Optional[pulumi.Input[str]] = None,
|
|
282
|
-
on_role_name: Optional[pulumi.Input[str]] = None,
|
|
283
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None,
|
|
284
|
-
to_role_name: Optional[pulumi.Input[str]] = None) -> 'RoleOwnershipGrant':
|
|
285
|
-
"""
|
|
286
|
-
Get an existing RoleOwnershipGrant resource's state with the given name, id, and optional extra
|
|
287
|
-
properties used to qualify the lookup.
|
|
288
|
-
|
|
289
|
-
:param str resource_name: The unique name of the resulting resource.
|
|
290
|
-
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
291
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
292
|
-
:param pulumi.Input[str] current_grants: Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
293
|
-
:param pulumi.Input[str] on_role_name: The name of the role ownership is granted on.
|
|
294
|
-
:param pulumi.Input[str] revert_ownership_to_role_name: The name of the role to revert ownership to on destroy.
|
|
295
|
-
:param pulumi.Input[str] to_role_name: The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
296
|
-
"""
|
|
297
|
-
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
298
|
-
|
|
299
|
-
__props__ = _RoleOwnershipGrantState.__new__(_RoleOwnershipGrantState)
|
|
300
|
-
|
|
301
|
-
__props__.__dict__["current_grants"] = current_grants
|
|
302
|
-
__props__.__dict__["on_role_name"] = on_role_name
|
|
303
|
-
__props__.__dict__["revert_ownership_to_role_name"] = revert_ownership_to_role_name
|
|
304
|
-
__props__.__dict__["to_role_name"] = to_role_name
|
|
305
|
-
return RoleOwnershipGrant(resource_name, opts=opts, __props__=__props__)
|
|
306
|
-
|
|
307
|
-
@property
|
|
308
|
-
@pulumi.getter(name="currentGrants")
|
|
309
|
-
def current_grants(self) -> pulumi.Output[Optional[str]]:
|
|
310
|
-
"""
|
|
311
|
-
Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
312
|
-
"""
|
|
313
|
-
return pulumi.get(self, "current_grants")
|
|
314
|
-
|
|
315
|
-
@property
|
|
316
|
-
@pulumi.getter(name="onRoleName")
|
|
317
|
-
def on_role_name(self) -> pulumi.Output[str]:
|
|
318
|
-
"""
|
|
319
|
-
The name of the role ownership is granted on.
|
|
320
|
-
"""
|
|
321
|
-
return pulumi.get(self, "on_role_name")
|
|
322
|
-
|
|
323
|
-
@property
|
|
324
|
-
@pulumi.getter(name="revertOwnershipToRoleName")
|
|
325
|
-
def revert_ownership_to_role_name(self) -> pulumi.Output[Optional[str]]:
|
|
326
|
-
"""
|
|
327
|
-
The name of the role to revert ownership to on destroy.
|
|
328
|
-
"""
|
|
329
|
-
return pulumi.get(self, "revert_ownership_to_role_name")
|
|
330
|
-
|
|
331
|
-
@property
|
|
332
|
-
@pulumi.getter(name="toRoleName")
|
|
333
|
-
def to_role_name(self) -> pulumi.Output[str]:
|
|
334
|
-
"""
|
|
335
|
-
The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
336
|
-
"""
|
|
337
|
-
return pulumi.get(self, "to_role_name")
|
|
338
|
-
|